• Title/Summary/Keyword: execution monitoring

Search Result 184, Processing Time 0.028 seconds

Risk Critical Point (RCP): A Quantifying Safety-Based Method Developed to Screen Construction Safety Risks

  • Soltanmohammadi, Mehdi;Saberi, Morteza;Yoon, Jin Hee;Soltanmohammadi, Khatereh;Pazhoheshfar, Peiman
    • Industrial Engineering and Management Systems
    • /
    • v.14 no.3
    • /
    • pp.221-235
    • /
    • 2015
  • Risk assessment is an important phase of risk management. It is the stage in which risk is measured thoroughly to achieve effective management. Some factors such as probability and impact of risk have been used in the literature related to construction projects. Because in high-rise projects safety issues are paramount, this study has tried to develop a quantifying technique that takes into account three factors: probability, impact and Safety Performance Index (SPI) where the SPI is defined as the capability of an appropriate response to reduce or limit the effect of an event after its occurrence with regard to safety pertaining to a project. Regarding risk-related literatures which cover an uncertain subject, the proposed method developed in this research is based on a fuzzy logic approach. This approach entails a questionnaire in which the subjectivity and vagueness of responses is dealt with by using triangular fuzzy numbers instead of linguistic terms. This method returns a Risk Critical Point (RCP) on a zoning chart that places risks under categories: critical, critical-probability, critical-impact, and non-critical. The high-rise project in the execution phase has been taken as a case study to confirm the applicability of the proposed method. The monitoring results showed that the RCP method has the inherent ability to be extended to subsequent applications in the phases of risk response and control.

A Study on Shelf-life Management Program of Long-term Storage One-shot System (장기 저장되는 일회성 시스템의 수명 관리 프로그램에 대한 연구)

  • Park, Dong-in;Shim, Hang-Geun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.628-633
    • /
    • 2020
  • This paper presents an analysis of the shelf-life management program of the long-term storage one-shot system. The one-shot system is mainly maintained with long-term storage or non-operating status and is operated once at execution of the mission. The function corresponding to one-shot is mainly operated through a shelf-life item such as an explosive. The performance and characteristics of shelf-life item are subject to change as the storage period passes. Therefore, shelf-life management for maintaining good condition is very important during long-term storage, and criteria for management is necessary. We present a method for optimizing shelf-life extension by comparing criteria for management with current reliability. Next, the shelf-life evaluation schedule was decided by utilizing the reliability function of exponential distribution and Weibull distribution. Continuously accumulated test data from the shelf-life evaluation were analyzed, and the parameter of distribution was updated. The extension or expiration of shelf-life was selected by monitoring changes in reliability. In addition, we confirmed the applicability of the presented shelf-life management program by applying ASRP test data of the one-shot system K000 fuse.

Design and Implementation of Mobile VNC System for GUI Control and Monitoring of Remote Computer (원격 컴퓨터의 GUI 제어와 모니터링을 위한 Mobile VNC 시스템 설계 및 구현)

  • Chon Hee-ja;Seo Jung-Hee;Park Hung-Bog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.912-919
    • /
    • 2005
  • The Growth in wireless Internet has made Networking possible at anytime and anywhere. So mobile devices like cellular phone and PDA are now used in various fields. In particular, the mobility of mobile devices has a great advantage in remote control. This paper designed and implemented a Mobile VNC system that transmitted the screen image of a remote computer, control the remote computer GU and monitor all by cellular phone. The proposed system consists of a Mobile Viewer un on the cellular phone, VNC Server m on a number of remote computers and a VNC Monitor. For communication between the VNC Server and the Mobile Viewer the MRFB protocol is used. The screen image transmitted to the Mobile Viewer is encoded in the PNG format supported by SK-VM, the Java execution environment of the Cellular phone. According to implementation results, the image is about $2KB\~8KB$. According to the 65 times transmission test, the average frame per second is 4.93fps in the emulator and a real cellular phone takes 0.8fps. Therefore, the proposed system is more efficient than existing systems.

Realization of GIS Service Scenario on the Basis of the Urban Control System (도시관제시스템 기반의 GIS 서비스 시나리오 구현)

  • Park, Joon-Kyu;Baik, Song-Hoon;Seo, Dong-Seob;Kang, Joon-Mook
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.27 no.4
    • /
    • pp.485-493
    • /
    • 2009
  • The u-City offers diverse u-services, which are integrated with information and GIS technologies, by utilizing an integrated management platform for controlling the city efficiently, increasing convenience of city lift, and improving the quality of lives. An urban control system is a core element of the u-City to connect organically and expand all kinds of information through various u-interfaces. This study presents the implementation of a GIS service module based on the urban control system for the efficient development of u-services, which contributed to the successful execution of GIS service scenarios that include processes of unexpected events, air pollution monitoring, and emergences. The results of the study can be used as basic data for the design and operation of practical u-City services.

The Future of BlockChain Technology Leading Innovation in the Industrial Ecosystem (산업 생태계의 혁신을 선도할 블록체인 기술의 미래전망)

  • Kim, Jung-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.324-332
    • /
    • 2018
  • Blockchain technology has the potential to revolutionize trust models and business processes in a variety of industries. However, it is considered to be the initial stage of the system that pursues autonomy rather than efficiency, and it is necessary to monitor and inspect the distributed ledger technology from the price and introduction time as compared with the existing relational DB transaction technology. However, domestic and foreign private sectors have already been activated by applying block-chain technology in the national domain, and the block chain is devoid of doubt that it is an exaggerated technology, characterized by the invariance of the record, transparency, and autonomous execution of business rules. It has begun to be utilized in history, identity, certification and auditing in the financial industry as well as various industries. In this paper, we analyze the problems such as security weakness, insufficient regulatory environment, technical consensus and lack of common standard. In addition, the business sense and possibility of the block chain technology is expected to be the innovation of the industrial ecosystem by entering into the reality system from the concept through monitoring the actual introduction performance in the field of copyright, logistics, health care and environment.

A Study on Applet Control on the Internet Communication using Java Bytecode (자바 바이트 코드를 이용한 인터넷 통신의 애플릿 제어)

  • 김문환;나상동
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.5C
    • /
    • pp.523-531
    • /
    • 2003
  • Java applets are downloaded from web server through internet and executed in Java Virtual Machine of clients'browser. Before execution of java applets, JVM checks bytecode program with bytecode verifier and performs runtime tests with interpreter. However, these tests will not protect against undesirable runtime behavior of java applets, such as denial of service attack, email forging attack, URL spoofing attack, or annoying sound attack. In order to protect malicious applets, a technique used in this paper is java bytecode modification. This technique is used to restrict applet behavior or insert code appropriate to profiling or other monitoring efforts. Java byte modification is divided into two general forms, class-level modification involving subclassing non-final classes and method-level modification used when control over objects from final classes or interface. This paper showed that malicious applets are controlled by java bytecode modification using proxy server. This implementation does not require any changes in the web sever, JVM or web browser.

Process and Results of Seoul Metropolitan Government's Environmental Health Policy Road Map (서울시 환경보건정책 로드맵 수립)

  • Lim, Ji-Ae;Kwon, Ho-Jang;Kim, Shinbum;Chou, Youngeun;Gu, Seulgi;Jeong, Hoi-Seong;Kim, Myung Han;Choi, Kyungho
    • Journal of Environmental Health Sciences
    • /
    • v.40 no.5
    • /
    • pp.425-434
    • /
    • 2014
  • Objectives: The purpose of this study is to introduce the establishment process and results of the Seoul Metropolitan Government's road map on environmental health policy. Methods: The process consisted of expert group meetings, civic participation, research, and questionnaire survey for priority environmental health policy agenda items in Seoul. Results: The announced vision for the environmental health policy was "a healthy environment, safety in Seoul". This policy was established in order to define environment health policy initiatives for a period of five years with an aim to protect Seoul citizens' health from hazardous environmental factors. The resulting Seoul environmental health policy consisted of four areas and 16 key agenda items. The four areas were "Protection for children against hazardous materials", "Enhancement of health and safety of all", "Carcinogen-free and endocrine-disrupting chemical-free Seoul (reducing environmental exposure to hazardous materials), and "Establish the foundation of environmental health policy". Sixteen key agenda items include the enhancement of management of spaces for children, certification of environmental health status at schools, establishment of a unit responsible for the environmental health of children, strengthening environmental health management for susceptible populations (children, the aged, and the socioeconomically vulnerable), management of hazardous materials, physical hazardous factors (noise, radiation, etc.), indoor air quality, and the enhancement of monitoring, research, and regulation of environment health. Conclusion: The Seoul Metropolitan Government established an environmental health policy road map for a five-year period (2013-2017). To implement this environmental health policy, budget allocation, and detailed execution plans are required.

Goal-based Evaluation of Contextual Situations for Self-adaptive Software (자기적응형 소프트웨어를 위한 목표 기반의 외부상황 평가 기법)

  • Kim Jae-Sun;Park Soo-Yong
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.3
    • /
    • pp.316-334
    • /
    • 2006
  • In the traditional computing paradigm, developers design software to run in a fixed and well-defined environment. The real environment, however, is too complicated to analyze all situations perfectly. Consequently, traditional software, which is implemented only for what is wanted as input, often fails badly in real environment. As a new approach, self-adaptive software can avoid runtime failures adapting to unpredictable situations. Self-adaptive software must firstly evaluate the contextual situation to determine the need for adaptation. Existing researches do not support the abstraction mechanism for identifying contextual problem. Consequently, they can have troubles with identifying the contextual problem as the execution environment is getting complex. In addition, they cannot support the expandability for contextual problems, which software can evaluate. This paper suggests the goal-based evaluation method of contextual situation for coping with the limitations of existing researches.

P2P-based Regional Matchmaking Techniques for Distributing Redundant-works in Volunteer Computing Environments (자발적 컴퓨팅 환경에서 중복작업 분배를 위한 P2P 기반 지역적 매치메이킹 기법)

  • Cheon, Eun-Young;Kim, Mi-Kyoung;Kuk, Seung-Hak;Kim, Hyeon-Soo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.831-835
    • /
    • 2009
  • Volunteer computing is a computing paradigm in which the operations of a large-scale application are processed using idle resources of Internet-connected computers. The redundant-work distribution techniques used in the volunteer computing environment cause some problems like delay of the work completion time or inefficiency of the work execution due to continuous requests of the work redistribution because the techniques do not consider the characteristics of works and dynamic resources. To cope with such problems this paper suggests a P2P based regional matchmaking technique which can redistribute works in consideration of the characteristics of the works and the participant resources. The techniques consist of the profiles for works/resources, the module for monitoring the available resources spaces, the protocols for the matching request/reply, the module for match-ratio calculation, and so on.

A Self-Regulated Robot System using Sensor Network (센서 네트워크를 이용한 자율 로봇 시스템)

  • Park, Chul-Min;Jo, Heung-Kuk;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1954-1960
    • /
    • 2008
  • Modem Robot is used in all industries. Previous Robot was used by simplicity work, at recent times, robot is developed in form that can do action such as a person. Robot's action runs according to command repeat or in the every moment according to sensor's output value, achieve other action. In this raper, we studied about self-regulation transfer robot that follow Object autonomously. This robot can be used by purpose that carry heavy burden instead of human. Robot's composition is drive part which run object's position awareness Sensor, Processor that control action and Motor part. After robot is connects with Network, we did robot remote control and monitor the action situation of robot. For the methode to reduce drive error, we developed algorithm for outside environment. For an experiment we made the self-regulation robot. We showed the directivity of sensor, error of directivity and soft moving of robot. We showed the monitoring system and the execution screen for communication between robot and PC.